Celebrating 20 Years of Trustworthy Computing

Credit to Author: Lauren Goodwin| Date: Fri, 21 Jan 2022 17:00:00 +0000

20 years ago this week, Bill Gates sent a now-famous email to all Microsoft employees announcing the creation of the Trustworthy Computing (TwC) initiative. The initiative was intended to put customer security, and ultimately customer trust, at the forefront for all Microsoft employees.

The post Celebrating 20 Years of Trustworthy Computing appeared first on Microsoft Security Blog.

Read more

Destructive malware targeting Ukrainian organizations

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Sun, 16 Jan 2022 02:28:30 +0000

Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine.

The post Destructive malware targeting Ukrainian organizations appeared first on Microsoft Security Blog.

Read more

Learn about 4 approaches to comprehensive security that help leaders be fearless

Credit to Author: Emma Jones| Date: Thu, 13 Jan 2022 17:00:00 +0000

The last 18 months have put pressure on organizations to speed up their digital transformation as hybrid work continues to become the new normal. Yet even with all the change and uncertainty, having the right security support system in place means your organization can still move forward confidently to turn your vision into reality.

The post Learn about 4 approaches to comprehensive security that help leaders be fearless appeared first on Microsoft Security Blog.

Read more

Microsoft Zero Trust solutions deliver 92 percent return on investment, says new Forrester study

Credit to Author: Pooja Parab| Date: Wed, 12 Jan 2022 17:00:00 +0000

Total Economic Impact™ study conducted by Forrester Consulting and commissioned by Microsoft reveals cost savings and business benefits enabled by Zero Trust.

The post Microsoft Zero Trust solutions deliver 92 percent return on investment, says new Forrester study appeared first on Microsoft Security Blog.

Read more

Align your security and network teams to Zero Trust security demands

Credit to Author: Pooja Parab| Date: Mon, 10 Jan 2022 18:00:00 +0000

Get expert advice on how to bridge gaps between your SOC and NOC and enable Zero Trust security in today’s rapidly evolving threat landscape.

The post Align your security and network teams to Zero Trust security demands appeared first on Microsoft Security Blog.

Read more

New macOS vulnerability, “powerdir,” could lead to unauthorized user data access

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Mon, 10 Jan 2022 17:00:00 +0000

A new macOS vulnerability, “powerdir,” could allow an attacker to bypass the operating system’s TCC technology and gain unauthorized access to a user’s protected data. We shared our findings with Apple through Coordinated Vulnerability Disclosure (CVD) and Apple released a fix.

The post New macOS vulnerability, “powerdir,” could lead to unauthorized user data access appeared first on Microsoft Security Blog.

Read more

What you need to know about how cryptography impacts your security strategy

Credit to Author: Pooja Parab| Date: Tue, 04 Jan 2022 17:00:00 +0000

Taurus SA Co-founder and Chief Security Officer Jean-Philippe “JP” Aumasson shares how the discipline of cryptography will impact cybersecurity strategy.

The post What you need to know about how cryptography impacts your security strategy appeared first on Microsoft Security Blog.

Read more